Which security method encrypts the data?
A. IPSec
B. CHAP
C. LUN masking
D. Header and Data Digests
Cfmode is a(n)______-specific setting.
A. FCP
B. iSCSI
C. Active/Active
D. Active/Passive
Which three are used for creating LUNs on the storage appliance? (Choose 3)
A. lun create
B. lun setup
C. FilerView
D. lun config
What will happen if a soft quota is exceeded?
A. All write operations will fail.
B. An autosupport message will be sent.
C. An SNMP warning message will be generated.
D. A spare disk will be added to the volume.
CIFS clients can resolve symbolic links created by NFS clients on the storage system.
A. True
B. False
Which command would you use to set up the network interface?
A. ifstat
B. sysconfig - v
C. ifconfig
D. netstat - i
Which statement best describes the output of the following command? sysstat-s 5
A. Display utilization output every five seconds and print a summary upon termination.
B. Display extended output every five seconds and print a summary upon termination.
C. Display the default output every five seconds and print a summary upon termination.
D. Display the default output every five seconds and terminate after five counts.
To configure a storage system as a member of a Windows active directory domain, the time on the storage system must be set to be within plus or minus five minutes of the time on the domain controller.
A. True
B. False
To view per client NFS statistics on a storage system, the option nfs.per_client_stats.enable must be set on.
A. True
B. False
If you change the setting for the option cifs.neg_buf_size, you need to terminate CIFS on the storage system and do a restart for the changes to take effect.
A. True
B. False